Databases Reference
In-Depth Information
120. J. Smith and C. Dodge. Developments in steganography. In A. Pfitzmann,
editor, Proceedings of the third Int. Workshop on Information Hiding , pages
77-87, Dresden, Germany, September 1999. Springer Verlag.
121. D. Xiaodong Song, D. Wagner, and A. Perrig. Practical techniques for searches
on encrypted data. In SP '00: Proceedings of the 2000 IEEE Symposium on
Security and Privacy (S&P 2000) . IEEE Computer Society, 2000.
122. J. Stern. A new and ecient all-or-nothing disclosure of secrets protocol. In
Proceedings of Asia Crypt , pages 357-371, 1998.
123. Thomas Y. C. Woo and Simon S. Lam. Authentication for distributed systems.
Computer , 25(1):39-52, 1992.
124. C. P. Wright, M. Martino, and E. Zadok. NCryptfs: A Secure and Convenient
Cryptographic File System. In Proceedings of the Annual USENIX Technical
Conference , pages 197-210, San Antonio, TX, June 2003. USENIX Association.
125. Nan Zhang and Wei Zhao. Distributed Privacy Preserving Information Sharing.
In Proceedings of the International Conference on Very Large Databases VLDB ,
2005.
Search WWH ::




Custom Search